US20090089381A1 - Pending and exclusive electronic mail inbox - Google Patents
Pending and exclusive electronic mail inbox Download PDFInfo
- Publication number
- US20090089381A1 US20090089381A1 US11/864,706 US86470607A US2009089381A1 US 20090089381 A1 US20090089381 A1 US 20090089381A1 US 86470607 A US86470607 A US 86470607A US 2009089381 A1 US2009089381 A1 US 2009089381A1
- Authority
- US
- United States
- Prior art keywords
- messages
- status
- inbox
- section
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/107—Computer-aided management of electronic mailing [e-mailing]
Definitions
- Electronic mail has become one of the most used modern communication tools.
- An e-mail user has typically at least one e-mail account with an e-mail service provider (e.g., from a web-based source or from the user's employment) for sending and receiving electronic messages.
- the user also typically uses either a web browser to review e-mail messages from a web-based e-mail service provider or an e-mail client application installed on the user's computer for viewing e-mail messages.
- e-mail inboxes now include a mixture of e-mail messages. Some messages are from individuals listed in a user's contacts or address book. Others may be SPAM or unwanted messages. Furthermore, there are other e-mail messages from known sources that may or may not be welcome.
- a user's inbox typically shows a list of messages sorted chronologically according to the time of arrival of the messages. The user may sort them by conversation (i.e., e-mail threads), sender, size, alphabetically by subject, etc. There may be other filters or mechanisms that may first filter out some e-mail messages before delivering the remaining messages to the user's inbox. Once in the inbox, however, the user usually spends time to identify unwanted messages and delete them before reading the desirable or legitimate messages intended for the user. They typically scan the sender names and subjects, looking for unwanted or unrecognized items.
- Embodiments of the invention improve user experiences in using e-mail inboxes by providing a convenient way for the user to differentiate between safe e-mails (such as e-mail messages from contacts or known sources) and unknown mail by placing them in two separate or distinguished places in the inbox.
- Aspects of the invention place messages from unknown or suspicious senders in a pending section or area of the inbox while messages from safe senders are delivered in a separate or exclusive section or area of the inbox.
- embodiments of the invention do not further re-direct messages away from user's inbox; aspects of the invention maintain the messages in the inbox but in different sections or areas for easy recognition.
- Alternative embodiments of the invention enable the users to receive notifications if there are new e-mail messages in the pending section and enable the users to specify if the messages in the pending section are safe, unsafe, subject for deletion, subject for moving/archiving to another folder, or no actions needed.
- the messages from safe senders may then be moved to the separate or exclusive section of the inbox while messages from unsafe senders in the pending section may be treated as junk e-mail messages.
- Alternative aspects of the invention may keep the messages in the pending section if the users wish to ignore the pending section and dedicate their time to read only e-mail from safe list or from their contacts in the exclusive section. In this way, users would feel more in control over their inbox and reduce the feeling that bad mail or lower priority mail (like newsletters) are blocking them from getting to their good e-mail messages.
- FIG. 1 is an exemplary embodiment of a system for providing electronic mail (e-mail) messages to a user in an e-mail inbox according to an embodiment of the invention.
- e-mail electronic mail
- FIGS. 2A , 2 B, 2 D to 2 E are exemplary screen shots illustrating a pending section and an exclusive section of an inbox according to an embodiment of the invention.
- FIG. 2C is an exemplary diagram illustrating three exclusive or filter settings according to an embodiment of the invention.
- FIG. 2F is an exemplary diagram illustrating interactions of messages within a first section and a section of an inbox according to an embodiment of the invention.
- FIG. 3 is an exemplary flow chart illustrating operation of distinguishing electronic mail (e-mail) messages for a user according to an embodiment of the invention.
- FIG. 4 is a block diagram illustrating an exemplary computer-readable medium having a data structure stored thereon which aspects of the invention may be stored.
- Embodiments of the invention simplify the user's experience in one's messages' inbox by differentiating messages in one's box and allowing the user to have an opportunity to read messages from safe and known senders before having to scan through messages from unknown and potentially dangerous senders.
- FIG. 1 a block diagram illustrates a system 100 for providing electronic mail (e-mail) messages to a user 102 in an inbox according to an embodiment of the invention.
- e-mail electronic mail
- the system 100 may be a computing system having a server computer providing services to one or more other computers, such as client computing computers.
- the system 100 may be a web server hosting a web site that is visited by users, such as user 102 over an intranet or internet.
- the system 100 includes a processor 104 executing computer-executable instructions for performing a plurality of operations.
- the processor 104 may execute computer-executable instructions embodied in one or more software applications, components within an application or software, executable library files, executable applets, or the like.
- the system 100 also includes a memory area 106 accessible by the processor 104 for storing information and data for the processor 104 .
- the memory area 104 may store data used by or accessed by the processor 104 , such as software, applications, data, or the like.
- the system 100 accesses data stored on the memory area 104 via a network 112 .
- the memory area 104 may be volatile or nonvolatile media, removable and non-removable media, may be any available medium that may be accessed by a computer or a collection of computers (not shown).
- computer readable media include computer storage media.
- the computer storage media in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data.
- computer storage media include RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium that may be used to store the desired information and that may be accessed by the computer.
- the system 100 provides an interface 110 for interacting with the user 102 .
- the interface 110 may include a web site or a web portal where the user 102 may visit via a web browser software (not shown).
- the system 100 may be a web e-mail system which may include one or more other computers and database servers for receiving, storing, and sending e-mail messages on behalf of one or more users.
- a web-based e-mail system 100 may include the user 102 having an account with the system 100 and the system 100 , based on a set of user usage rules, assigns an amount of storage area for the user 102 in the memory area 106 for storing e-mail messages, data associated with the user's contact list, or the like.
- the processor 104 may execute computer-executable instructions or software or applications to perform operations received according to interactions from the user 102 via the interface 110 .
- the user 102 may compose an e-mail message from the interface 110 by entering the text or content of the message. It is to be understood that other operations may be provided by the processor 104 to the user 102 without departing from the scope of the embodiments of the invention.
- FIG. 2A an exemplary screen shot illustrates a pending section and an exclusive section of an e-mail inbox according to an embodiment of the invention.
- FIG. 2A illustrates an exemplary display screen 200 with a folder list display holder 204 and a set of e-mail operations 208 .
- the folder list display holder 204 includes folders such as INBOX, DRAFTS, SENT ITEMS, JUNK, or DELETED. It is to be understood and appreciated that other folders or items may be included in the folder list display holder 204 without departing from the scope of the invention.
- the folder list display holder 204 also includes a control or a button that enables management of the folders.
- the set of e-mail operations 208 includes one or more actions that a user can act on an e-mail message.
- the set includes controls or actions, such as NEW E-MAIL, DELETE, REPLY, REPLY ALL, JUNK, PRINT, FORWARD, CHECK MAIL, EXCLUSIVE, MARK AS SAFE, STANDARD, MARK AS UNSAFE, or the like. Other actions or operations may be included without departing from the scope of the invention.
- the display screen 200 further includes a content area 212 where one or more e-mail messages are listed.
- the content area 212 of the display 200 includes an exclusive control or button 214 for enabling a pending section 216 and an exclusive section 218 of the content area 212 of the inbox.
- the display 200 Upon activating or enabling of the exclusive feature of the e-mail inbox, the display 200 renders the pending section 216 and the exclusive section 218 .
- the pending section 216 displays one or more messages that have inbox status data 220 associated with each one of the messages accordingly.
- the inbox status data 220 may indicate one or more following information about each of the messages in the pending section 216 : safe preference, unsafe preference, or a deletion preference.
- Embodiments of the invention also enable the user to mark the message as safe/unsafe, to delete it, or to move it to the safe area of the inbox. If they choose to move it to the safe area of the inbox, aspects of the invention offer the option of moving just this one mail or all mails from this sender that are in the pending area (or maybe just future ones from this sender, but not all past ones). In other words, decisions about both the sender and mails from the sender are made through the marking of the messages according to the safe/unsafe, delete or move operations.
- the safe preference indicates that the user 102 wishes to define a particular e-mail message as an acceptable or legitimate e-mail message that the user 102 wishes to receive and does not wish to make additional determination as the valid.
- e-mail messages that are safe may be messages from friends, relatives, or acquaintances of the user 102 .
- the user 102 may define an “unsafe” inbox status as being unwanted, such as junk e-mail or SPAM.
- the deletion preference may indicate that the user 102 wishes to delete the message without reading it.
- the user 102 may elect to enable a “MARK AS SAFE” control or button 226 to mark a message “SAFE” in the pending section 216 after the user 102 highlights or selects the message.
- the user 102 may elect to enable a “MARK AS UNSAFE” control or button 228 to mark a message “UNSAFE” in the pending section 216 after the user 102 highlights or selects the message.
- the user 102 may modify the inbox status data 220 by interacting (e.g., via an input device of the system accessible by the user 102 ) with the portion of the message under the column section of “SAFE,” “UNSAFE,” or “DEL.”
- the exclusive section 218 of the content area 212 includes a header that shows information in different columns, such as FROM, SUBJECT, and DATE. Other column headings may be included without departing from the scope of the invention.
- all messages in the exclusive section 218 indicate the inbox status data 220 as “SAFE” or “CONTACT.”
- the processor 104 specifies the pending section 216 and the exclusive section 218 and separates or distinguishes the messages into two groups.
- the first set in the pending section 216 includes messages that have unknown inbox status data.
- the unknown inbox status data may be defined as an e-mail message source not included in a contact list of the user or an e-mail message source not included in a safe list defined by the user.
- Other definition or criterion may be established for the unknown inbox status data without departing from the scope of the embodiments of the invention.
- UNKNOWN status may also indicate reputations of senders of the message.
- the exclusive section 218 of the inbox of the display 200 includes messages with known inbox status data.
- the known inbox status data may be defined to include at least one of the following statuses: a safe status and a contact status.
- embodiments may nevertheless mark messages as SAFE or CONTACT if messages from a particulars have been received continuously without any adverse reaction from the user.
- the user 102 is able to have all e-mail messages delivered to inbox while some of them being separated, distinguished, or divided into a different section of the inbox such that the user 102 has an opportunity to decide further how to define or classify the messages.
- the user 102 may modify the inbox status data 220 of the messages in the pending section 216 and the processor 104 may move the messages with the modified inbox status data to the exclusive section 218 or other folders.
- the user 102 may use an input device, such as a computer mouse, to modify the inbox status data 220 of a particular message and such modification is persisted or made permanent when the user 102 selects an “APPLY” control or button 230 .
- the user 102 may modify a group of messages in the pending section 216 of the inbox by using a square check box in front of the messages and the one or more controls or buttons in the set of operations 208 .
- embodiments of the invention enable the user 102 to have enhanced user experience in controlling how the e-mail messages are received and organized in the inbox and enabling the user to set viewing preferences based on the inbox status data.
- the user 102 can then quickly focus on the legitimate or “good” messages by quickly viewing the messages in the exclusive section 218 of the inbox.
- the user 102 may completely ignore the messages in the pending section 216 and the messages in the pending section 216 may be automatically removed or deleted after a predetermined time period by the processor 104 .
- the exclusive button 214 is further divided to three separation buttons with three states.
- FIG. 2B illustrates such embodiment having a low state 214 - 1 , a standard state 214 - 2 , and an exclusive state 214 - 3 .
- the user can both set their junk mail filter and activating the pending/safe areas in this embodiment. For example, when the user chooses Low state 214 - 1 , the users are indicating that the users wish to have the lowest amount of filtering and thus most of the mail, even ones are somewhat suspect end up in the inbox. At the same time, choosing Low state 214 - 1 means the user will not see a “pending” area. Everything is in one area in the inbox.
- FIG. 2C a diagram illustrating the three sub-state settings for the exclusive button 214 according to an embodiment of the invention.
- FIG. 2C illustrates examples describe above in a simplified method.
- messages that are classified as “Hidden Safe list” are messages from senders who are recipients of messages from the user but the user has yet to identify them as be “SAFE” or “CONTACT”, or messages that the user has read at least three times but the user has yet to identify them as be “SAFE” or “CONTACT”, or messages from senders who are known to have good reputation but the user has yet to identify them as be “SAFE” or “CONTACT”.
- the mixed reputation classification includes messages such as first time personal message, some newsletters from legitimate sources, messages from some online vendors, messages with “RE:” in the subject line of the messages, or messages from senders who are not recognized by the user. It is contemplated by inventors of embodiments of the invention that other definitions or classifications may be used to define one or more sub-state of the exclusive button with filtering functionality without departing from the scope and spirit of embodiments of the invention.
- FIGS. 2D and 2F further illustration additional screen shots according to embodiments of the invention and illustrate various additional features of the inbox with the Exclusive/filter functionality.
- a feature 240 of FIG. 2D illustrates that the pending or first section of the inbox separation may be hidden in a default mode of the inbox when rendered to the user.
- a pagination feature 242 in FIG. 2E illustrates the controls for placing one or more messages into different pages within the pending section or the first section and the pagination feature 242 enables the user navigate from pages to pages of the pending section.
- FIG. 2F is a diagram illustrating one or more interactions between different types of message classifications within the first section and the second section.
- a first section row of the inbox 246 describes the kind of messages in the first section while a second section of the inbox 248 describes the how a user makes a message that is marked as “SAFE” to “CONTACT” within the second section of the inbox.
- FIG. 3 is an exemplary flow chart illustrating operation of distinguishing electronic mail (e-mail) messages for a user according to an embodiment of the invention.
- an e-mail inbox including one or more e-mail messages therein is provided to the user.
- a determination is made at 304 to detect or identify whether the user 102 has activated the “EXCLUSIVE” control or button 214 embodying aspects of the invention. If the determination is positive, a pending section of the inbox is specified for the user 102 at 306 .
- the pending section includes a set of the one or more messages, and the set of the one or more messages indicate an unknown status. If the determination is negative, all messages are listed in the inbox at 308 without the pending section 216 or the exclusive section 218 .
- an exclusive section of the inbox is specified.
- the exclusive section includes the remaining set of the one or more messages, and the remaining set of the messages indicates a known status.
- a second determination is made to identify whether an instruction is received from the user to modify the inbox status data of the messages in the pending section 216 at 312 . If the determination is negative, the process ends at 314 .
- a third determination is made to identify whether the modification to the inbox status data is equal to “SAFE” status at 316 . If the determination is positive, the processor 104 or the system 100 modifies the inbox status data of the identified message and moves the message from the pending section 216 to the exclusive section 218 at 318 . If the third determination is negative, the messages may be moved to a junk mail folder or be deleted based on an “UNSAFE” status or a “DELETED” status.
- FIG. 4 is a block diagram illustrates an exemplary computer-readable medium 400 having a data structure 402 stored thereon which aspects of the invention may be stored.
- a first data field 404 stores inbox status data for each of the one or more messages in the e-mail inbox.
- a second data field 406 stores data representing a first set of the one or more messages in the e-mail inbox. Each of the one or more messages in the second data field 406 specifies an unknown status in the first data field 404 .
- the data structure 402 also includes a third data field 408 storing data representing a second set of the one or more messages in the e-mail inbox. Each of the one or more messages in the third data field 408 specifies a known status in the first data field 404 .
- the processor 104 executes computer-executable instructions such as those illustrated in the figures to implement aspects of the invention.
- Embodiments of the invention may be implemented with computer-executable instructions.
- the computer-executable instructions may be organized into one or more computer-executable components or modules.
- Aspects of the invention may be implemented with any number and organization of such components or modules. For example, aspects of the invention are not limited to the specific computer-executable instructions or the specific components or modules illustrated in the figures and described herein.
- Other embodiments of the invention may include different computer-executable instructions or components having more or less functionality than illustrated and described herein.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Human Resources & Organizations (AREA)
- Entrepreneurship & Innovation (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Software Systems (AREA)
- Economics (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Distinguishing electronic mail (e-mail) messages for a user. An e-mail inbox is provided to include one or more e-mail messages therein. A first section of the inbox is specified. The first section includes a set of the one or more messages, and the set of the one or more messages is indicative of an unknown status. An second section of the inbox is provided, and the second section includes the remaining set of the one or more messages. The remaining set of the messages is indicative of a known status.
Description
- Electronic mail (e-mail) has become one of the most used modern communication tools. An e-mail user has typically at least one e-mail account with an e-mail service provider (e.g., from a web-based source or from the user's employment) for sending and receiving electronic messages. The user also typically uses either a web browser to review e-mail messages from a web-based e-mail service provider or an e-mail client application installed on the user's computer for viewing e-mail messages.
- With the popularity and convenience of e-mail, unwanted messages, such as SPAM, junk mail, or electronic advertisements, slowly but surely fill the user's e-mail inbox. As such, e-mail inboxes now include a mixture of e-mail messages. Some messages are from individuals listed in a user's contacts or address book. Others may be SPAM or unwanted messages. Furthermore, there are other e-mail messages from known sources that may or may not be welcome.
- Current inbox implementations typically provide generic listings of e-mail messages that are received. For example, a user's inbox typically shows a list of messages sorted chronologically according to the time of arrival of the messages. The user may sort them by conversation (i.e., e-mail threads), sender, size, alphabetically by subject, etc. There may be other filters or mechanisms that may first filter out some e-mail messages before delivering the remaining messages to the user's inbox. Once in the inbox, however, the user usually spends time to identify unwanted messages and delete them before reading the desirable or legitimate messages intended for the user. They typically scan the sender names and subjects, looking for unwanted or unrecognized items. They are many times confused by the legitimicay of some of the e-mails, especially the ones with “re” in the title that look like they come from someone they know. This usually requires them to open the mail before learning it is offensive or unwanted. The user may also occasionally need to review messages in other folders that include filtered message, such as the folder that is designed for temporarily saved SPAM messages. This precautionary, but nevertheless necessary, action is needed to ensure that legitimate messages that may be erroneously identified as SPAM are read before they are automatically deleted by the SPAM folder. The user continues to spend more time on removing or identifying unwanted messages in the inbox.
- Embodiments of the invention improve user experiences in using e-mail inboxes by providing a convenient way for the user to differentiate between safe e-mails (such as e-mail messages from contacts or known sources) and unknown mail by placing them in two separate or distinguished places in the inbox. Aspects of the invention place messages from unknown or suspicious senders in a pending section or area of the inbox while messages from safe senders are delivered in a separate or exclusive section or area of the inbox. Hence, embodiments of the invention do not further re-direct messages away from user's inbox; aspects of the invention maintain the messages in the inbox but in different sections or areas for easy recognition. Alternative embodiments of the invention enable the users to receive notifications if there are new e-mail messages in the pending section and enable the users to specify if the messages in the pending section are safe, unsafe, subject for deletion, subject for moving/archiving to another folder, or no actions needed. The messages from safe senders may then be moved to the separate or exclusive section of the inbox while messages from unsafe senders in the pending section may be treated as junk e-mail messages. Alternative aspects of the invention may keep the messages in the pending section if the users wish to ignore the pending section and dedicate their time to read only e-mail from safe list or from their contacts in the exclusive section. In this way, users would feel more in control over their inbox and reduce the feeling that bad mail or lower priority mail (like newsletters) are blocking them from getting to their good e-mail messages.
- This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
- Other features will be in part apparent and in part pointed out hereinafter.
-
FIG. 1 is an exemplary embodiment of a system for providing electronic mail (e-mail) messages to a user in an e-mail inbox according to an embodiment of the invention. -
FIGS. 2A , 2B, 2D to 2E are exemplary screen shots illustrating a pending section and an exclusive section of an inbox according to an embodiment of the invention. -
FIG. 2C is an exemplary diagram illustrating three exclusive or filter settings according to an embodiment of the invention. -
FIG. 2F is an exemplary diagram illustrating interactions of messages within a first section and a section of an inbox according to an embodiment of the invention. -
FIG. 3 is an exemplary flow chart illustrating operation of distinguishing electronic mail (e-mail) messages for a user according to an embodiment of the invention. -
FIG. 4 is a block diagram illustrating an exemplary computer-readable medium having a data structure stored thereon which aspects of the invention may be stored. - Corresponding reference characters indicate corresponding parts throughout the drawings.
- Embodiments of the invention simplify the user's experience in one's messages' inbox by differentiating messages in one's box and allowing the user to have an opportunity to read messages from safe and known senders before having to scan through messages from unknown and potentially dangerous senders. Referring now to
FIG. 1 , a block diagram illustrates asystem 100 for providing electronic mail (e-mail) messages to auser 102 in an inbox according to an embodiment of the invention. It is to be understood that, while figures use an e-mail message for illustrations, other messages, such as faxes, voice mails, offline instant messages, private messages or the like that are delivered to the e-mail box are considered as “e-mail messages” throughout the discussions of embodiments of the invention. Thesystem 100 may be a computing system having a server computer providing services to one or more other computers, such as client computing computers. In another embodiment, thesystem 100 may be a web server hosting a web site that is visited by users, such asuser 102 over an intranet or internet. Thesystem 100 includes aprocessor 104 executing computer-executable instructions for performing a plurality of operations. In one example, theprocessor 104 may execute computer-executable instructions embodied in one or more software applications, components within an application or software, executable library files, executable applets, or the like. Thesystem 100 also includes amemory area 106 accessible by theprocessor 104 for storing information and data for theprocessor 104. For example, thememory area 104 may store data used by or accessed by theprocessor 104, such as software, applications, data, or the like. In another embodiment, thesystem 100 accesses data stored on thememory area 104 via anetwork 112. - In one embodiment, the
memory area 104 may be volatile or nonvolatile media, removable and non-removable media, may be any available medium that may be accessed by a computer or a collection of computers (not shown). By way of example and not limitation, computer readable media include computer storage media. The computer storage media in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. For example, computer storage media include RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium that may be used to store the desired information and that may be accessed by the computer. - In one embodiment, the
system 100 provides aninterface 110 for interacting with theuser 102. For example, theinterface 110 may include a web site or a web portal where theuser 102 may visit via a web browser software (not shown). In one aspect of the invention, thesystem 100 may be a web e-mail system which may include one or more other computers and database servers for receiving, storing, and sending e-mail messages on behalf of one or more users. For example and as appreciated by those known in the art, a web-basede-mail system 100 may include theuser 102 having an account with thesystem 100 and thesystem 100, based on a set of user usage rules, assigns an amount of storage area for theuser 102 in thememory area 106 for storing e-mail messages, data associated with the user's contact list, or the like. Theprocessor 104 may execute computer-executable instructions or software or applications to perform operations received according to interactions from theuser 102 via theinterface 110. For example, theuser 102 may compose an e-mail message from theinterface 110 by entering the text or content of the message. It is to be understood that other operations may be provided by theprocessor 104 to theuser 102 without departing from the scope of the embodiments of the invention. - Referring now to
FIG. 2A , an exemplary screen shot illustrates a pending section and an exclusive section of an e-mail inbox according to an embodiment of the invention.FIG. 2A illustrates anexemplary display screen 200 with a folderlist display holder 204 and a set ofe-mail operations 208. The folderlist display holder 204 includes folders such as INBOX, DRAFTS, SENT ITEMS, JUNK, or DELETED. It is to be understood and appreciated that other folders or items may be included in the folderlist display holder 204 without departing from the scope of the invention. The folderlist display holder 204 also includes a control or a button that enables management of the folders. - The set of
e-mail operations 208 includes one or more actions that a user can act on an e-mail message. For example, the set includes controls or actions, such as NEW E-MAIL, DELETE, REPLY, REPLY ALL, JUNK, PRINT, FORWARD, CHECK MAIL, EXCLUSIVE, MARK AS SAFE, STANDARD, MARK AS UNSAFE, or the like. Other actions or operations may be included without departing from the scope of the invention. Thedisplay screen 200 further includes acontent area 212 where one or more e-mail messages are listed. - According to one aspect of the invention, the
content area 212 of thedisplay 200 includes an exclusive control orbutton 214 for enabling a pendingsection 216 and anexclusive section 218 of thecontent area 212 of the inbox. Upon activating or enabling of the exclusive feature of the e-mail inbox, thedisplay 200 renders the pendingsection 216 and theexclusive section 218. The pendingsection 216 displays one or more messages that haveinbox status data 220 associated with each one of the messages accordingly. In one example, theinbox status data 220 may indicate one or more following information about each of the messages in the pending section 216: safe preference, unsafe preference, or a deletion preference. Embodiments of the invention also enable the user to mark the message as safe/unsafe, to delete it, or to move it to the safe area of the inbox. If they choose to move it to the safe area of the inbox, aspects of the invention offer the option of moving just this one mail or all mails from this sender that are in the pending area (or maybe just future ones from this sender, but not all past ones). In other words, decisions about both the sender and mails from the sender are made through the marking of the messages according to the safe/unsafe, delete or move operations. - For example, the safe preference indicates that the
user 102 wishes to define a particular e-mail message as an acceptable or legitimate e-mail message that theuser 102 wishes to receive and does not wish to make additional determination as the valid. In a further example, e-mail messages that are safe may be messages from friends, relatives, or acquaintances of theuser 102. Also, as another illustration, theuser 102 may define an “unsafe” inbox status as being unwanted, such as junk e-mail or SPAM. The deletion preference may indicate that theuser 102 wishes to delete the message without reading it. Similarly, theuser 102 may elect to enable a “MARK AS SAFE” control orbutton 226 to mark a message “SAFE” in the pendingsection 216 after theuser 102 highlights or selects the message. Likewise, theuser 102 may elect to enable a “MARK AS UNSAFE” control orbutton 228 to mark a message “UNSAFE” in the pendingsection 216 after theuser 102 highlights or selects the message. In an alternative embodiment, theuser 102 may modify theinbox status data 220 by interacting (e.g., via an input device of the system accessible by the user 102) with the portion of the message under the column section of “SAFE,” “UNSAFE,” or “DEL.” - The
exclusive section 218 of thecontent area 212 includes a header that shows information in different columns, such as FROM, SUBJECT, and DATE. Other column headings may be included without departing from the scope of the invention. In one embodiment, all messages in theexclusive section 218 indicate theinbox status data 220 as “SAFE” or “CONTACT.” - Initially, the
user 102 receives all messages, and all messages are displayed in thecontent area 212 of the inbox. Upon activation of theEXCLUSIVE control 214, theprocessor 104 specifies the pendingsection 216 and theexclusive section 218 and separates or distinguishes the messages into two groups. The first set in the pendingsection 216 includes messages that have unknown inbox status data. In one example, the unknown inbox status data may be defined as an e-mail message source not included in a contact list of the user or an e-mail message source not included in a safe list defined by the user. Other definition or criterion may be established for the unknown inbox status data without departing from the scope of the embodiments of the invention. For example, UNKNOWN status may also indicate reputations of senders of the message. - On the other hand, the
exclusive section 218 of the inbox of thedisplay 200 includes messages with known inbox status data. For example, the known inbox status data may be defined to include at least one of the following statuses: a safe status and a contact status. Alternative, just because the user may not have specifically marked a particular message as “SAFE” or “CONTACT,” embodiments may nevertheless mark messages as SAFE or CONTACT if messages from a particulars have been received continuously without any adverse reaction from the user. As such, theuser 102 is able to have all e-mail messages delivered to inbox while some of them being separated, distinguished, or divided into a different section of the inbox such that theuser 102 has an opportunity to decide further how to define or classify the messages. In a further aspect of the invention, theuser 102 may modify theinbox status data 220 of the messages in the pendingsection 216 and theprocessor 104 may move the messages with the modified inbox status data to theexclusive section 218 or other folders. For example, as illustrated inFIG. 2A , theuser 102 may use an input device, such as a computer mouse, to modify theinbox status data 220 of a particular message and such modification is persisted or made permanent when theuser 102 selects an “APPLY” control or button 230. In one embodiment, theuser 102 may modify a group of messages in the pendingsection 216 of the inbox by using a square check box in front of the messages and the one or more controls or buttons in the set ofoperations 208. - As such, embodiments of the invention enable the
user 102 to have enhanced user experience in controlling how the e-mail messages are received and organized in the inbox and enabling the user to set viewing preferences based on the inbox status data. Theuser 102 can then quickly focus on the legitimate or “good” messages by quickly viewing the messages in theexclusive section 218 of the inbox. In an alternative embodiment, theuser 102 may completely ignore the messages in the pendingsection 216 and the messages in the pendingsection 216 may be automatically removed or deleted after a predetermined time period by theprocessor 104. - In one embodiment, the
exclusive button 214 is further divided to three separation buttons with three states.FIG. 2B illustrates such embodiment having a low state 214-1, a standard state 214-2, and an exclusive state 214-3. By choosing one of the states, the user can both set their junk mail filter and activating the pending/safe areas in this embodiment. For example, when the user chooses Low state 214-1, the users are indicating that the users wish to have the lowest amount of filtering and thus most of the mail, even ones are somewhat suspect end up in the inbox. At the same time, choosing Low state 214-1 means the user will not see a “pending” area. Everything is in one area in the inbox. - When the user chooses “standard” state 214-2, the users are indicating the users want the filter set to a standard level where mails from suspicious senders and senders with mixed reputations will end up in a pending area or a first section of the inbox and mails from senders who are on the contact list, on the safe list, messages from people the user has sent multiple messages to but haven't added to the safe list, or messages from senders considered as having a good reputation from company where one works end up in the safe or exclusive area or a second section of the inbox. When the user chooses Exclusive state 214-3, then the users are indicating that the users wish to have the highest level of filtering. Only messages from safe senders and contacts end up in the safe area or the second section of the inbox as well as people the user has sent messages to multiple times but has not added to the contact list. Good reputation senders, however, are sent to the pending area or the first section. If the user has set the filter setting at the exclusive state 214-3, for example, embodiments of the invention enable all messages will be delivered according to the exclusive state 214-3 until further changes are made by the user.
- On the other hand, if during one of the user's online sessions, the user changes the filter to standard state 214-2 or low state 214-1, the messages from the different types of senders would move into the appropriate area (such as messages from good reputation would move from the pending area or the first section to the safe area or the second section of the Inbox according to a change from the exclusive state 214-3 to the standard state 214-2). Furthermore, embodiments of the invention set the filter with the standard state 214-2 setting until further changes.
- Referring now to
FIG. 2C , a diagram illustrating the three sub-state settings for theexclusive button 214 according to an embodiment of the invention. In one embodiment,FIG. 2C illustrates examples describe above in a simplified method. In one example, messages that are classified as “Hidden Safe list” are messages from senders who are recipients of messages from the user but the user has yet to identify them as be “SAFE” or “CONTACT”, or messages that the user has read at least three times but the user has yet to identify them as be “SAFE” or “CONTACT”, or messages from senders who are known to have good reputation but the user has yet to identify them as be “SAFE” or “CONTACT”. In another embodiment, the mixed reputation classification includes messages such as first time personal message, some newsletters from legitimate sources, messages from some online vendors, messages with “RE:” in the subject line of the messages, or messages from senders who are not recognized by the user. It is contemplated by inventors of embodiments of the invention that other definitions or classifications may be used to define one or more sub-state of the exclusive button with filtering functionality without departing from the scope and spirit of embodiments of the invention. -
FIGS. 2D and 2F further illustration additional screen shots according to embodiments of the invention and illustrate various additional features of the inbox with the Exclusive/filter functionality. For example, afeature 240 ofFIG. 2D illustrates that the pending or first section of the inbox separation may be hidden in a default mode of the inbox when rendered to the user. When displaying the pending section or first section, apagination feature 242 inFIG. 2E illustrates the controls for placing one or more messages into different pages within the pending section or the first section and thepagination feature 242 enables the user navigate from pages to pages of the pending section. -
FIG. 2F is a diagram illustrating one or more interactions between different types of message classifications within the first section and the second section. For example, a first section row of theinbox 246 describes the kind of messages in the first section while a second section of theinbox 248 describes the how a user makes a message that is marked as “SAFE” to “CONTACT” within the second section of the inbox. -
FIG. 3 is an exemplary flow chart illustrating operation of distinguishing electronic mail (e-mail) messages for a user according to an embodiment of the invention. At 302, an e-mail inbox including one or more e-mail messages therein is provided to the user. In one embodiment, a determination is made at 304 to detect or identify whether theuser 102 has activated the “EXCLUSIVE” control orbutton 214 embodying aspects of the invention. If the determination is positive, a pending section of the inbox is specified for theuser 102 at 306. The pending section includes a set of the one or more messages, and the set of the one or more messages indicate an unknown status. If the determination is negative, all messages are listed in the inbox at 308 without the pendingsection 216 or theexclusive section 218. - At 310, an exclusive section of the inbox is specified. The exclusive section includes the remaining set of the one or more messages, and the remaining set of the messages indicates a known status. In a further alternative embodiment, a second determination is made to identify whether an instruction is received from the user to modify the inbox status data of the messages in the pending
section 216 at 312. If the determination is negative, the process ends at 314. On the other hand, if the determination is positive, a third determination is made to identify whether the modification to the inbox status data is equal to “SAFE” status at 316. If the determination is positive, theprocessor 104 or thesystem 100 modifies the inbox status data of the identified message and moves the message from the pendingsection 216 to theexclusive section 218 at 318. If the third determination is negative, the messages may be moved to a junk mail folder or be deleted based on an “UNSAFE” status or a “DELETED” status. -
FIG. 4 is a block diagram illustrates an exemplary computer-readable medium 400 having adata structure 402 stored thereon which aspects of the invention may be stored. For example, afirst data field 404 stores inbox status data for each of the one or more messages in the e-mail inbox. Asecond data field 406 stores data representing a first set of the one or more messages in the e-mail inbox. Each of the one or more messages in thesecond data field 406 specifies an unknown status in thefirst data field 404. Thedata structure 402 also includes athird data field 408 storing data representing a second set of the one or more messages in the e-mail inbox. Each of the one or more messages in thethird data field 408 specifies a known status in thefirst data field 404. - In operation, the
processor 104 executes computer-executable instructions such as those illustrated in the figures to implement aspects of the invention. - The order of execution or performance of the operations in embodiments of the invention illustrated and described herein is not essential, unless otherwise specified. That is, the operations may be performed in any order, unless otherwise specified, and embodiments of the invention may include additional or fewer operations than those disclosed herein. For example, it is contemplated that executing or performing a particular operation before, contemporaneously with, or after another operation is within the scope of aspects of the invention.
- Embodiments of the invention may be implemented with computer-executable instructions. The computer-executable instructions may be organized into one or more computer-executable components or modules. Aspects of the invention may be implemented with any number and organization of such components or modules. For example, aspects of the invention are not limited to the specific computer-executable instructions or the specific components or modules illustrated in the figures and described herein. Other embodiments of the invention may include different computer-executable instructions or components having more or less functionality than illustrated and described herein.
- When introducing elements of aspects of the invention or the embodiments thereof, the articles “a,” “an,” “the,” and “said” are intended to mean that there are one or more of the elements. The terms “comprising,” “including,” and “having” are intended to be inclusive and mean that there may be additional elements other than the listed elements.
- Having described aspects of the invention in detail, it will be apparent that modifications and variations are possible without departing from the scope of aspects of the invention as defined in the appended claims. As various changes could be made in the above constructions, products, and methods without departing from the scope of aspects of the invention, it is intended that all matter contained in the above description and shown in the accompanying drawings shall be interpreted as illustrative and not in a limiting sense.
Claims (20)
1. A method for distinguishing messages for a user, said method comprising:
providing an inbox including one or more messages from one or more senders therein;
specifying a first section of the inbox, said first section including a set of the one or more messages from the one or more senders, said set of the one or more messages whose senders have an unknown status; and
specifying an second section of the inbox, said second section including the remaining set of the one or more messages from the one or more senders, said remaining set of the messages being indicative of a known status.
2. The method of claim 1 , wherein the unknown status indicates the set of the one or more messages from the one or more senders including at least one of the following properties: a message source not included in a contact list of the user, a message source not included in a safe list defined by the user, senders with frequent message communications but without a proper status, good reputation senders, mixed reputation senders, potentially dangerous senders, and changes to distinguishing message settings.
3. The method of claim 1 , further comprising receiving an instruction from the user for modifying the unknown status of the one or more messages from the one or more senders in the first section of the inbox, and further comprising providing at least one or more operations in response to the received instruction: identifying the one or more messages with the modified unknown status to the second section, relocating all messages from a sender with the modified unknown status to the first section, and relocating future messages from the sender to the second section.
4. The method of claim 3 , wherein receiving comprises one or more of the following:
wherein receiving the instruction from the user for modifying the unknown status of the one or more messages in the first section of the inbox to the known status, and further comprising moving the one or more messages with the known status from the first section of the inbox to the second section of the inbox,
wherein receiving comprises receiving the instruction from the user for modifying the unknown status of the one or more messages in the first section of the inbox to an unsafe status, and further comprising moving the one or more messages with the unsafe status from the first section of the inbox to a junk e-mail storage, or
wherein receiving comprises receiving the instruction from the user for modifying the unknown status of the one or more messages in the first section of the inbox to a deleted status, and further comprising performing at least one or more of the following operations in response to the received instruction: removing the one or more messages with the deleted status from the first section of the inbox, deleting all messages from a sender with deleted status, and deleting the one or more messages with the deleted status at this time.
5. The method of claim 1 , further comprising receiving a filter for specifying the first section and the second section, said filter defining at least a low state, a standard state, and an exclusive state, wherein the low state, the standard state, and the exclusive state defining one or more messages from senders based on a function of the unknown status and the known status.
6. The method of claim 5 , further comprising applying the received filter to a junk folder, wherein the applied filter filters the one or more messages to the junk folder, the first section of the inbox, and the second section of the inbox as a function of the unknown status and the known status.
7. A tangible computer-readable medium having a data structure stored thereon for partitioning messages in an inbox, said data structure storing data for one or more messages, said data structure comprising:
a first data field storing inbox status data for each of the one or more messages in the inbox;
a second data field storing data representing a first set of the one or more messages from senders in the inbox,
wherein each of the one or more messages in the second data field specifying an unknown status in the first data field; and
a third data field storing data representing a second set of the one or more messages in the inbox,
wherein each of the one or more messages of the third data field specifying a known status in the first data field.
8. The tangible computer-readable media of claim 7 , wherein the unknown status of the first data field indicates the first set of the one or more messages including at least one of the following properties: a message source not included in a contact list of the user, a message source not included in a safe list defined by the user, senders with frequent message communications but without a proper status, good reputation senders, mixed reputation senders, potentially dangerous senders, and changes to distinguishing message settings.
9. The tangible computer-readable media of claim 7 , wherein the known status of the first data field includes at least one of the following status: a safe status and a contact status.
10. The tangible computer-readable media of claim 7 , wherein the first data field is receptive to modification from the user.
11. The tangible computer-readable media of claim 9 , wherein the modification comprises one or more of the following:
modifying the unknown status in the first data field of the messages in the second data field to the known status in the first data field, and wherein the messages corresponding to the modified unknown status are moved to the second set in the third data field,
modifying the unknown status in the first data field of the messages in the second data field to a safe status in the first data field, and wherein the messages corresponding to the safe status are moved to the second set in the third data field, or
modifying the unknown status in the first data field of the messages in the second data field to a deleted status in the first data field, and wherein the messages corresponding to the deleted status in the first data field are moved from the second data field.
12. The tangible computer-readable media of claim 7 , further comprising a fourth data field storing a filter for specifying the first section and the second section, said filter defining at least a low state, a standard state, and an exclusive state, wherein the low state, the standard state, and the exclusive state defining one or more messages from senders based on a function of the unknown status and the known status.
13. The tangible computer-readable media of claim 12 , wherein the filter of the fourth field is applied to a junk folder, wherein the applied filter filters the one or more messages to the junk folder, the first section of the inbox, and the second section of the inbox as a function of the unknown status and the known status.
14. A system for providing messages to a user in an e-mail inbox, said system comprising:
a memory area for storing one or more messages from senders in the inbox;
an interface for providing the stored messages to a user;
a processor having configured to execute computer-executable instructions for:
specifying a first section of the inbox on the interface, said first section including a set of the one or more messages, said set of the one or more messages being indicative of an unknown status; and
specifying an second section of the inbox on the interface, said second section including the remaining set of the one or more messages, said remaining set of the messages being indicative of a known status.
15. The system of claim 14 , wherein the known status includes at least one of the following status: a safe status and a contact status.
16. The system of claim 14 , wherein the unknown status indicates the set of the one or more messages from the senders including at least one of the following properties: a message source not included in a contact list of the user, a message source not included in a safe list defined by the user, senders with frequent message communications but without a proper status, good reputation senders, mixed reputation senders, potentially dangerous senders, and changes to distinguishing message settings.
17. The system of claim 14 , wherein the interface is further configured to receive an instruction from the user for modifying the unknown status of the one or more messages in the first section of the inbox on the interface.
18. The system of claim 17 :
wherein the interface receives the instruction from the user for modifying the unknown status of the one or more messages in the first section of the inbox to the known status, and wherein the processor is configured to move at least to the following: the one or more messages with the known status from the first section of the inbox to the second section of the inbox and all future messages from the sender associated with the one or more messages,
wherein the interface receives the instruction from the user for modifying the unknown status of the one or more messages in the first section of the inbox to a unsafe status, and wherein the processor is configured to move at least to the following: the one or more messages with the unsafe status from the first section of the inbox to a junk e-mail storage, and all future messages from the sender associated with the one or more messages; or
wherein the interface receives the instruction from the user for modifying the unknown status of the one or more messages in the first section of the inbox to a deleted status, and wherein the processor is configured to remove the one or more messages with the deleted status from the first section of the inbox.
19. The system of claim 14 , further comprising a filter for specifying the first section and the second section, said filter defining at least a low state, a standard state, and an exclusive state, wherein the low state, the standard state, and the exclusive state defining one or more messages from senders based on a function of the unknown status and the known status.
20. The system of claim 19 , wherein the processor is configured to apply the filter to a junk folder, wherein the applied filter filters the one or more messages to the junk folder, the first section of the inbox, and the second section of the inbox as a function of the unknown status and the known status.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/864,706 US20090089381A1 (en) | 2007-09-28 | 2007-09-28 | Pending and exclusive electronic mail inbox |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/864,706 US20090089381A1 (en) | 2007-09-28 | 2007-09-28 | Pending and exclusive electronic mail inbox |
Publications (1)
Publication Number | Publication Date |
---|---|
US20090089381A1 true US20090089381A1 (en) | 2009-04-02 |
Family
ID=40509599
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/864,706 Abandoned US20090089381A1 (en) | 2007-09-28 | 2007-09-28 | Pending and exclusive electronic mail inbox |
Country Status (1)
Country | Link |
---|---|
US (1) | US20090089381A1 (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090217205A1 (en) * | 2008-02-27 | 2009-08-27 | Lenovo (Beijing) Limited | Method and apparatus for performing multi-selection |
US20100299394A1 (en) * | 2009-05-20 | 2010-11-25 | International Business Machines Corporation | User-configured alternate email rendering |
US20120079045A1 (en) * | 2010-09-24 | 2012-03-29 | Robert Plotkin | Profile-Based Message Control |
US20120185469A1 (en) * | 2011-01-18 | 2012-07-19 | Robust Decisions, Inc. | Advanced filtering mechanism tools and techniques |
US20130159878A1 (en) * | 2011-12-19 | 2013-06-20 | Samsung Electronics Co., Ltd. | Method and apparatus for managing message |
US20140040399A1 (en) * | 2010-09-24 | 2014-02-06 | Yagi Corp. | Enforced Unitasking in Multitasking Systems |
US9065786B2 (en) | 2010-09-24 | 2015-06-23 | Yagi Corp. | Context-sensitive auto-responder |
US10031950B2 (en) | 2011-01-18 | 2018-07-24 | Iii Holdings 2, Llc | Providing advanced conditional based searching |
US11477068B2 (en) * | 2012-09-27 | 2022-10-18 | Kaseya Limited | Data network notification bar user interface |
Citations (83)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4991094A (en) * | 1989-04-26 | 1991-02-05 | International Business Machines Corporation | Method for language-independent text tokenization using a character categorization |
US5867162A (en) * | 1996-12-06 | 1999-02-02 | Sun Microsystems, Inc. | Methods, systems, and computer program products for controlling picklists |
US5999932A (en) * | 1998-01-13 | 1999-12-07 | Bright Light Technologies, Inc. | System and method for filtering unsolicited electronic mail messages using data matching and heuristic processing |
US6161130A (en) * | 1998-06-23 | 2000-12-12 | Microsoft Corporation | Technique which utilizes a probabilistic classifier to detect "junk" e-mail by automatically updating a training and re-training the classifier based on the updated training set |
US6178419B1 (en) * | 1996-07-31 | 2001-01-23 | British Telecommunications Plc | Data access system |
US6233575B1 (en) * | 1997-06-24 | 2001-05-15 | International Business Machines Corporation | Multilevel taxonomy based on features derived from training documents classification using fisher values as discrimination values |
US6334131B2 (en) * | 1998-08-29 | 2001-12-25 | International Business Machines Corporation | Method for cataloging, filtering, and relevance ranking frame-based hierarchical information structures |
US6341280B1 (en) * | 1998-10-30 | 2002-01-22 | Netscape Communications Corporation | Inline tree filters |
US20020023135A1 (en) * | 2000-05-16 | 2002-02-21 | Shuster Brian Mark | Addressee-defined mail addressing system and method |
US6389436B1 (en) * | 1997-12-15 | 2002-05-14 | International Business Machines Corporation | Enhanced hypertext categorization using hyperlinks |
US6393464B1 (en) * | 1999-05-10 | 2002-05-21 | Unbound Communications, Inc. | Method for controlling the delivery of electronic mail messages |
US20020087646A1 (en) * | 2000-11-01 | 2002-07-04 | Hickey Matthew W. | System and method for group electronic mailbox |
US6421709B1 (en) * | 1997-12-22 | 2002-07-16 | Accepted Marketing, Inc. | E-mail filter and method thereof |
US20020107853A1 (en) * | 2000-07-26 | 2002-08-08 | Recommind Inc. | System and method for personalized search, information filtering, and for generating recommendations utilizing statistical latent class models |
US6434600B2 (en) * | 1998-09-15 | 2002-08-13 | Microsoft Corporation | Methods and systems for securely delivering electronic mail to hosts having dynamic IP addresses |
US20020120702A1 (en) * | 2001-02-26 | 2002-08-29 | Schiavone Vincent J. | Method and apparatus for dynamic prioritization of electronic mail messages |
US20020133557A1 (en) * | 2001-03-03 | 2002-09-19 | Winarski Donna Ilene Robinson | Sorting e-mail |
US20030009385A1 (en) * | 2000-12-26 | 2003-01-09 | Tucciarone Joel D. | Electronic messaging system and method thereof |
US20030023692A1 (en) * | 2001-07-27 | 2003-01-30 | Fujitsu Limited | Electronic message delivery system, electronic message delivery managment server, and recording medium in which electronic message delivery management program is recorded |
US20030061289A1 (en) * | 2001-09-24 | 2003-03-27 | International Business Machines Corporation | Apparatus and method of filtering out e-mail addresses from an e-mail distribution list |
US6557027B1 (en) * | 1999-08-05 | 2003-04-29 | International Business Machines Corporation | System and method for managing on-line discussion having multiple topics in a collaborative data processing environment |
US20030187937A1 (en) * | 2002-03-28 | 2003-10-02 | Yao Timothy Hun-Jen | Using fuzzy-neural systems to improve e-mail handling efficiency |
US20030195872A1 (en) * | 1999-04-12 | 2003-10-16 | Paul Senn | Web-based information content analyzer and information dimension dictionary |
US20030196116A1 (en) * | 2002-04-15 | 2003-10-16 | Todd Troutman | Electronic mail blocking system |
US20030212791A1 (en) * | 2002-04-23 | 2003-11-13 | Pickup Robert Barkley | Method and system for authorising electronic mail |
US20030233418A1 (en) * | 2002-06-18 | 2003-12-18 | Goldman Phillip Y. | Practical techniques for reducing unsolicited electronic messages by identifying sender's addresses |
US20040039786A1 (en) * | 2000-03-16 | 2004-02-26 | Horvitz Eric J. | Use of a bulk-email filter within a system for classifying messages for urgency or importance |
US6708205B2 (en) * | 2001-02-15 | 2004-03-16 | Suffix Mail, Inc. | E-mail messaging system |
US20040111480A1 (en) * | 2002-12-09 | 2004-06-10 | Yue Jonathan Zhanjun | Message screening system and method |
US20040143635A1 (en) * | 2003-01-15 | 2004-07-22 | Nick Galea | Regulating receipt of electronic mail |
US20040153483A1 (en) * | 2003-01-21 | 2004-08-05 | Red Hat, Inc. | Mail system synchronization |
US6779021B1 (en) * | 2000-07-28 | 2004-08-17 | International Business Machines Corporation | Method and system for predicting and managing undesirable electronic mail |
US20040167964A1 (en) * | 2003-02-25 | 2004-08-26 | Rounthwaite Robert L. | Adaptive junk message filtering system |
US20040177120A1 (en) * | 2003-03-07 | 2004-09-09 | Kirsch Steven T. | Method for filtering e-mail messages |
US20040205127A1 (en) * | 2003-03-26 | 2004-10-14 | Roy Ben-Yoseph | Identifying and using identities deemed to be known to a user |
US6816884B1 (en) * | 2000-01-27 | 2004-11-09 | Colin T. Summers | System and method for creating conversationally-styled summaries from digesting email messages |
US20040243844A1 (en) * | 2001-10-03 | 2004-12-02 | Reginald Adkins | Authorized email control system |
US20040254990A1 (en) * | 2003-06-13 | 2004-12-16 | Nokia, Inc. | System and method for knock notification to an unsolicited message |
US20050004989A1 (en) * | 2003-07-01 | 2005-01-06 | Microsoft Corporation | Automatic grouping of electronic mail |
US20050015451A1 (en) * | 2001-02-15 | 2005-01-20 | Sheldon Valentine D'arcy | Automatic e-mail address directory and sorting system |
US20050033810A1 (en) * | 2003-08-07 | 2005-02-10 | International Business Machines Corporation | Interceptor for non-subscribed bulk electronic messages |
US6868498B1 (en) * | 1999-09-01 | 2005-03-15 | Peter L. Katsikas | System for eliminating unauthorized electronic mail |
US6871217B2 (en) * | 1998-12-31 | 2005-03-22 | Michael Voticky | Prioritizing electronic messages based on the sender's address |
US20050080855A1 (en) * | 2003-10-09 | 2005-04-14 | Murray David J. | Method for creating a whitelist for processing e-mails |
US20050091320A1 (en) * | 2003-10-09 | 2005-04-28 | Kirsch Steven T. | Method and system for categorizing and processing e-mails |
US20050097174A1 (en) * | 2003-10-14 | 2005-05-05 | Daniell W. T. | Filtered email differentiation |
US20050097170A1 (en) * | 2003-10-31 | 2005-05-05 | Yahoo! Inc. | Community-based green list for antispam |
US6895426B1 (en) * | 2000-10-17 | 2005-05-17 | Microsoft Corporation | Addresses as objects for email messages |
US20050138552A1 (en) * | 2003-12-22 | 2005-06-23 | Venolia Gina D. | Clustering messages |
US20050144239A1 (en) * | 2003-12-29 | 2005-06-30 | Mattathil George P. | Email sender verification system |
US20050165895A1 (en) * | 2004-01-23 | 2005-07-28 | International Business Machines Corporation | Classification of electronic mail into multiple directories based upon their spam-like properties |
US20050198159A1 (en) * | 2004-03-08 | 2005-09-08 | Kirsch Steven T. | Method and system for categorizing and processing e-mails based upon information in the message header and SMTP session |
US20050235034A1 (en) * | 2004-04-15 | 2005-10-20 | International Business Machines Corporation | System and method for searchable instant messaging chat repositories using topic and identifier metadata |
US20050246420A1 (en) * | 2004-04-28 | 2005-11-03 | Microsoft Corporation | Social network email filtering |
US20050257159A1 (en) * | 2004-05-13 | 2005-11-17 | International Business Machines Corporation | Method and apparatus for identifying attachments in an email message |
US20050267944A1 (en) * | 2004-06-01 | 2005-12-01 | Microsoft Corporation | Email manager |
US20060010217A1 (en) * | 2004-06-04 | 2006-01-12 | Business Instruments Corp. | System and method for dynamic adaptive user-based prioritization and display of electronic messages |
US20060031313A1 (en) * | 2004-05-27 | 2006-02-09 | Libbey Miles A Iv | Method and system for segmentation of a message inbox |
US20060036701A1 (en) * | 2001-11-20 | 2006-02-16 | Bulfer Andrew F | Messaging system having message filtering and access control |
US7007067B1 (en) * | 1998-11-03 | 2006-02-28 | British Telecommunications Public Limited Company | Apparatus for processing communications |
US20060075028A1 (en) * | 2004-09-07 | 2006-04-06 | Zager Robert P | User interface and anti-phishing functions for an anti-spam micropayments system |
US20060101118A1 (en) * | 2002-08-28 | 2006-05-11 | Toshiyasu Yabe | Electronic mail delivery system |
US7051277B2 (en) * | 1998-04-17 | 2006-05-23 | International Business Machines Corporation | Automated assistant for organizing electronic documents |
US7076527B2 (en) * | 2001-06-14 | 2006-07-11 | Apple Computer, Inc. | Method and apparatus for filtering email |
US20060200523A1 (en) * | 2005-03-03 | 2006-09-07 | Tokuda Lance A | User interface for email inbox to call attention differently to different classes of email |
US20060212520A1 (en) * | 2005-03-15 | 2006-09-21 | America Online, Inc., | Electronic message system with federation of trusted senders |
US7127685B2 (en) * | 2002-04-30 | 2006-10-24 | America Online, Inc. | Instant messaging interface having a tear-off element |
US20060271631A1 (en) * | 2005-05-25 | 2006-11-30 | Microsoft Corporation | Categorizing mails by safety level |
US20070005702A1 (en) * | 2005-03-03 | 2007-01-04 | Tokuda Lance A | User interface for email inbox to call attention differently to different classes of email |
US7191221B2 (en) * | 2003-10-30 | 2007-03-13 | International Business Machines Corporation | Method for managing electronic mail receipts using audio-visual notification enhancements |
US7206814B2 (en) * | 2003-10-09 | 2007-04-17 | Propel Software Corporation | Method and system for categorizing and processing e-mails |
US7213206B2 (en) * | 2003-09-09 | 2007-05-01 | Fogg Brian J | Relationship user interface |
US7222158B2 (en) * | 2003-12-31 | 2007-05-22 | Aol Llc | Third party provided transactional white-listing for filtering electronic communications |
US20070143411A1 (en) * | 2005-12-16 | 2007-06-21 | Microsoft Corporation | Graphical interface for defining mutually exclusive destinations |
US7237009B1 (en) * | 2002-06-12 | 2007-06-26 | Novell, Inc. | Methods, systems and data structures for assigning categories to electronic mail |
US20070168430A1 (en) * | 2005-11-23 | 2007-07-19 | Xerox Corporation | Content-based dynamic email prioritizer |
US20070192743A1 (en) * | 2006-02-13 | 2007-08-16 | Research In Motion Limited | Method and arrangment for a primary actions menu for email applications on a handheld electronic device |
US7299261B1 (en) * | 2003-02-20 | 2007-11-20 | Mailfrontier, Inc. A Wholly Owned Subsidiary Of Sonicwall, Inc. | Message classification using a summary |
US20080126951A1 (en) * | 2005-06-03 | 2008-05-29 | C-Mail Corp. | System and method of dynamically prioritized electronic mail graphical user interface, and measuring email productivity and collaboration trends |
US7546348B2 (en) * | 2003-05-05 | 2009-06-09 | Sonicwall, Inc. | Message handling with selective user participation |
US7571220B1 (en) * | 2008-12-17 | 2009-08-04 | Kim Kwee Ng | Method and system for managing e-mails |
US7580984B2 (en) * | 2001-06-25 | 2009-08-25 | At&T Intellectual Property I, L.P. | System and method for sorting e-mail |
US7756930B2 (en) * | 2004-05-28 | 2010-07-13 | Ironport Systems, Inc. | Techniques for determining the reputation of a message sender |
-
2007
- 2007-09-28 US US11/864,706 patent/US20090089381A1/en not_active Abandoned
Patent Citations (88)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4991094A (en) * | 1989-04-26 | 1991-02-05 | International Business Machines Corporation | Method for language-independent text tokenization using a character categorization |
US6178419B1 (en) * | 1996-07-31 | 2001-01-23 | British Telecommunications Plc | Data access system |
US5867162A (en) * | 1996-12-06 | 1999-02-02 | Sun Microsystems, Inc. | Methods, systems, and computer program products for controlling picklists |
US6233575B1 (en) * | 1997-06-24 | 2001-05-15 | International Business Machines Corporation | Multilevel taxonomy based on features derived from training documents classification using fisher values as discrimination values |
US6389436B1 (en) * | 1997-12-15 | 2002-05-14 | International Business Machines Corporation | Enhanced hypertext categorization using hyperlinks |
US6421709B1 (en) * | 1997-12-22 | 2002-07-16 | Accepted Marketing, Inc. | E-mail filter and method thereof |
US5999932A (en) * | 1998-01-13 | 1999-12-07 | Bright Light Technologies, Inc. | System and method for filtering unsolicited electronic mail messages using data matching and heuristic processing |
US7051277B2 (en) * | 1998-04-17 | 2006-05-23 | International Business Machines Corporation | Automated assistant for organizing electronic documents |
US6161130A (en) * | 1998-06-23 | 2000-12-12 | Microsoft Corporation | Technique which utilizes a probabilistic classifier to detect "junk" e-mail by automatically updating a training and re-training the classifier based on the updated training set |
US6334131B2 (en) * | 1998-08-29 | 2001-12-25 | International Business Machines Corporation | Method for cataloging, filtering, and relevance ranking frame-based hierarchical information structures |
US6434600B2 (en) * | 1998-09-15 | 2002-08-13 | Microsoft Corporation | Methods and systems for securely delivering electronic mail to hosts having dynamic IP addresses |
US6341280B1 (en) * | 1998-10-30 | 2002-01-22 | Netscape Communications Corporation | Inline tree filters |
US7007067B1 (en) * | 1998-11-03 | 2006-02-28 | British Telecommunications Public Limited Company | Apparatus for processing communications |
US6871217B2 (en) * | 1998-12-31 | 2005-03-22 | Michael Voticky | Prioritizing electronic messages based on the sender's address |
US20030195872A1 (en) * | 1999-04-12 | 2003-10-16 | Paul Senn | Web-based information content analyzer and information dimension dictionary |
US6393464B1 (en) * | 1999-05-10 | 2002-05-21 | Unbound Communications, Inc. | Method for controlling the delivery of electronic mail messages |
US6557027B1 (en) * | 1999-08-05 | 2003-04-29 | International Business Machines Corporation | System and method for managing on-line discussion having multiple topics in a collaborative data processing environment |
US6868498B1 (en) * | 1999-09-01 | 2005-03-15 | Peter L. Katsikas | System for eliminating unauthorized electronic mail |
US6816884B1 (en) * | 2000-01-27 | 2004-11-09 | Colin T. Summers | System and method for creating conversationally-styled summaries from digesting email messages |
US20040039786A1 (en) * | 2000-03-16 | 2004-02-26 | Horvitz Eric J. | Use of a bulk-email filter within a system for classifying messages for urgency or importance |
US20020023135A1 (en) * | 2000-05-16 | 2002-02-21 | Shuster Brian Mark | Addressee-defined mail addressing system and method |
US20020107853A1 (en) * | 2000-07-26 | 2002-08-08 | Recommind Inc. | System and method for personalized search, information filtering, and for generating recommendations utilizing statistical latent class models |
US6779021B1 (en) * | 2000-07-28 | 2004-08-17 | International Business Machines Corporation | Method and system for predicting and managing undesirable electronic mail |
US6895426B1 (en) * | 2000-10-17 | 2005-05-17 | Microsoft Corporation | Addresses as objects for email messages |
US20020087646A1 (en) * | 2000-11-01 | 2002-07-04 | Hickey Matthew W. | System and method for group electronic mailbox |
US20030009385A1 (en) * | 2000-12-26 | 2003-01-09 | Tucciarone Joel D. | Electronic messaging system and method thereof |
US6708205B2 (en) * | 2001-02-15 | 2004-03-16 | Suffix Mail, Inc. | E-mail messaging system |
US20050015451A1 (en) * | 2001-02-15 | 2005-01-20 | Sheldon Valentine D'arcy | Automatic e-mail address directory and sorting system |
US20020120702A1 (en) * | 2001-02-26 | 2002-08-29 | Schiavone Vincent J. | Method and apparatus for dynamic prioritization of electronic mail messages |
US20020133557A1 (en) * | 2001-03-03 | 2002-09-19 | Winarski Donna Ilene Robinson | Sorting e-mail |
US7076527B2 (en) * | 2001-06-14 | 2006-07-11 | Apple Computer, Inc. | Method and apparatus for filtering email |
US7580984B2 (en) * | 2001-06-25 | 2009-08-25 | At&T Intellectual Property I, L.P. | System and method for sorting e-mail |
US20030023692A1 (en) * | 2001-07-27 | 2003-01-30 | Fujitsu Limited | Electronic message delivery system, electronic message delivery managment server, and recording medium in which electronic message delivery management program is recorded |
US20030061289A1 (en) * | 2001-09-24 | 2003-03-27 | International Business Machines Corporation | Apparatus and method of filtering out e-mail addresses from an e-mail distribution list |
US20040243844A1 (en) * | 2001-10-03 | 2004-12-02 | Reginald Adkins | Authorized email control system |
US20060036701A1 (en) * | 2001-11-20 | 2006-02-16 | Bulfer Andrew F | Messaging system having message filtering and access control |
US20030187937A1 (en) * | 2002-03-28 | 2003-10-02 | Yao Timothy Hun-Jen | Using fuzzy-neural systems to improve e-mail handling efficiency |
US20030196116A1 (en) * | 2002-04-15 | 2003-10-16 | Todd Troutman | Electronic mail blocking system |
US20030212791A1 (en) * | 2002-04-23 | 2003-11-13 | Pickup Robert Barkley | Method and system for authorising electronic mail |
US7127685B2 (en) * | 2002-04-30 | 2006-10-24 | America Online, Inc. | Instant messaging interface having a tear-off element |
US7237009B1 (en) * | 2002-06-12 | 2007-06-26 | Novell, Inc. | Methods, systems and data structures for assigning categories to electronic mail |
US20030233418A1 (en) * | 2002-06-18 | 2003-12-18 | Goldman Phillip Y. | Practical techniques for reducing unsolicited electronic messages by identifying sender's addresses |
US7516182B2 (en) * | 2002-06-18 | 2009-04-07 | Aol Llc | Practical techniques for reducing unsolicited electronic messages by identifying sender's addresses |
US20060101118A1 (en) * | 2002-08-28 | 2006-05-11 | Toshiyasu Yabe | Electronic mail delivery system |
US20040196968A1 (en) * | 2002-12-09 | 2004-10-07 | Yue Jonathan Zhanjun | Message screening system and method |
US20040111480A1 (en) * | 2002-12-09 | 2004-06-10 | Yue Jonathan Zhanjun | Message screening system and method |
US20040143635A1 (en) * | 2003-01-15 | 2004-07-22 | Nick Galea | Regulating receipt of electronic mail |
US20040153483A1 (en) * | 2003-01-21 | 2004-08-05 | Red Hat, Inc. | Mail system synchronization |
US7299261B1 (en) * | 2003-02-20 | 2007-11-20 | Mailfrontier, Inc. A Wholly Owned Subsidiary Of Sonicwall, Inc. | Message classification using a summary |
US20040167964A1 (en) * | 2003-02-25 | 2004-08-26 | Rounthwaite Robert L. | Adaptive junk message filtering system |
US20040177120A1 (en) * | 2003-03-07 | 2004-09-09 | Kirsch Steven T. | Method for filtering e-mail messages |
US7613776B1 (en) * | 2003-03-26 | 2009-11-03 | Aol Llc | Identifying and using identities deemed to be known to a user |
US20040210639A1 (en) * | 2003-03-26 | 2004-10-21 | Roy Ben-Yoseph | Identifying and using identities deemed to be known to a user |
US20040205127A1 (en) * | 2003-03-26 | 2004-10-14 | Roy Ben-Yoseph | Identifying and using identities deemed to be known to a user |
US7546348B2 (en) * | 2003-05-05 | 2009-06-09 | Sonicwall, Inc. | Message handling with selective user participation |
US20040254990A1 (en) * | 2003-06-13 | 2004-12-16 | Nokia, Inc. | System and method for knock notification to an unsolicited message |
US20050004989A1 (en) * | 2003-07-01 | 2005-01-06 | Microsoft Corporation | Automatic grouping of electronic mail |
US20050033810A1 (en) * | 2003-08-07 | 2005-02-10 | International Business Machines Corporation | Interceptor for non-subscribed bulk electronic messages |
US7213206B2 (en) * | 2003-09-09 | 2007-05-01 | Fogg Brian J | Relationship user interface |
US7206814B2 (en) * | 2003-10-09 | 2007-04-17 | Propel Software Corporation | Method and system for categorizing and processing e-mails |
US20050080855A1 (en) * | 2003-10-09 | 2005-04-14 | Murray David J. | Method for creating a whitelist for processing e-mails |
US20050091320A1 (en) * | 2003-10-09 | 2005-04-28 | Kirsch Steven T. | Method and system for categorizing and processing e-mails |
US20050097174A1 (en) * | 2003-10-14 | 2005-05-05 | Daniell W. T. | Filtered email differentiation |
US7191221B2 (en) * | 2003-10-30 | 2007-03-13 | International Business Machines Corporation | Method for managing electronic mail receipts using audio-visual notification enhancements |
US20050097170A1 (en) * | 2003-10-31 | 2005-05-05 | Yahoo! Inc. | Community-based green list for antispam |
US20050138552A1 (en) * | 2003-12-22 | 2005-06-23 | Venolia Gina D. | Clustering messages |
US20050144239A1 (en) * | 2003-12-29 | 2005-06-30 | Mattathil George P. | Email sender verification system |
US7222158B2 (en) * | 2003-12-31 | 2007-05-22 | Aol Llc | Third party provided transactional white-listing for filtering electronic communications |
US20050165895A1 (en) * | 2004-01-23 | 2005-07-28 | International Business Machines Corporation | Classification of electronic mail into multiple directories based upon their spam-like properties |
US20050198159A1 (en) * | 2004-03-08 | 2005-09-08 | Kirsch Steven T. | Method and system for categorizing and processing e-mails based upon information in the message header and SMTP session |
US20050235034A1 (en) * | 2004-04-15 | 2005-10-20 | International Business Machines Corporation | System and method for searchable instant messaging chat repositories using topic and identifier metadata |
US20050246420A1 (en) * | 2004-04-28 | 2005-11-03 | Microsoft Corporation | Social network email filtering |
US20050257159A1 (en) * | 2004-05-13 | 2005-11-17 | International Business Machines Corporation | Method and apparatus for identifying attachments in an email message |
US7428579B2 (en) * | 2004-05-27 | 2008-09-23 | Yahoo! Inc. | Method and system for segmentation of a message inbox |
US20060031313A1 (en) * | 2004-05-27 | 2006-02-09 | Libbey Miles A Iv | Method and system for segmentation of a message inbox |
US7756930B2 (en) * | 2004-05-28 | 2010-07-13 | Ironport Systems, Inc. | Techniques for determining the reputation of a message sender |
US20050267944A1 (en) * | 2004-06-01 | 2005-12-01 | Microsoft Corporation | Email manager |
US20060010217A1 (en) * | 2004-06-04 | 2006-01-12 | Business Instruments Corp. | System and method for dynamic adaptive user-based prioritization and display of electronic messages |
US20060075028A1 (en) * | 2004-09-07 | 2006-04-06 | Zager Robert P | User interface and anti-phishing functions for an anti-spam micropayments system |
US20070005702A1 (en) * | 2005-03-03 | 2007-01-04 | Tokuda Lance A | User interface for email inbox to call attention differently to different classes of email |
US20060200523A1 (en) * | 2005-03-03 | 2006-09-07 | Tokuda Lance A | User interface for email inbox to call attention differently to different classes of email |
US20060212520A1 (en) * | 2005-03-15 | 2006-09-21 | America Online, Inc., | Electronic message system with federation of trusted senders |
US20060271631A1 (en) * | 2005-05-25 | 2006-11-30 | Microsoft Corporation | Categorizing mails by safety level |
US20080126951A1 (en) * | 2005-06-03 | 2008-05-29 | C-Mail Corp. | System and method of dynamically prioritized electronic mail graphical user interface, and measuring email productivity and collaboration trends |
US20070168430A1 (en) * | 2005-11-23 | 2007-07-19 | Xerox Corporation | Content-based dynamic email prioritizer |
US20070143411A1 (en) * | 2005-12-16 | 2007-06-21 | Microsoft Corporation | Graphical interface for defining mutually exclusive destinations |
US20070192743A1 (en) * | 2006-02-13 | 2007-08-16 | Research In Motion Limited | Method and arrangment for a primary actions menu for email applications on a handheld electronic device |
US7571220B1 (en) * | 2008-12-17 | 2009-08-04 | Kim Kwee Ng | Method and system for managing e-mails |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8656310B2 (en) * | 2008-02-27 | 2014-02-18 | Lenovo (Beijing) Limited | Method and apparatus for performing multi-selection |
US20090217205A1 (en) * | 2008-02-27 | 2009-08-27 | Lenovo (Beijing) Limited | Method and apparatus for performing multi-selection |
US20100299394A1 (en) * | 2009-05-20 | 2010-11-25 | International Business Machines Corporation | User-configured alternate email rendering |
US10558949B2 (en) * | 2009-05-20 | 2020-02-11 | International Business Machines Corporation | User-configured alternate email rendering |
US9065786B2 (en) | 2010-09-24 | 2015-06-23 | Yagi Corp. | Context-sensitive auto-responder |
US20150331714A1 (en) * | 2010-09-24 | 2015-11-19 | Yagi Corp. | Enforced Unitasking in Multitasking Systems |
US20140040398A1 (en) * | 2010-09-24 | 2014-02-06 | Yagi Corp. | Enforced Unitasking in Multitasking Systems |
US20140040400A1 (en) * | 2010-09-24 | 2014-02-06 | Yagi Corp. | Enforced Unitasking in Multitasking Systems |
US20120079045A1 (en) * | 2010-09-24 | 2012-03-29 | Robert Plotkin | Profile-Based Message Control |
US9065785B2 (en) * | 2010-09-24 | 2015-06-23 | Yagi Corp. | Enforced unitasking in multitasking systems |
US10303510B2 (en) * | 2010-09-24 | 2019-05-28 | Yagi Corp. | Enforced unitasking in multitasking systems |
US9083660B2 (en) * | 2010-09-24 | 2015-07-14 | Yagi Corp. | Enforced unitasking in multitasking systems |
US9094352B2 (en) * | 2010-09-24 | 2015-07-28 | Yagi Corp. | Enforced unitasking in multitasking systems |
US20140040399A1 (en) * | 2010-09-24 | 2014-02-06 | Yagi Corp. | Enforced Unitasking in Multitasking Systems |
US20160050174A1 (en) * | 2010-09-24 | 2016-02-18 | Yagi Corp. | Profile-Based Message Control |
US9426100B2 (en) * | 2010-09-24 | 2016-08-23 | Yagi Corp. | Enforced unitasking in multitasking systems |
US10031950B2 (en) | 2011-01-18 | 2018-07-24 | Iii Holdings 2, Llc | Providing advanced conditional based searching |
US20120185469A1 (en) * | 2011-01-18 | 2012-07-19 | Robust Decisions, Inc. | Advanced filtering mechanism tools and techniques |
US9690441B2 (en) * | 2011-12-19 | 2017-06-27 | Samsung Electronics Co., Ltd. | Method and apparatus for managing message |
US20130159878A1 (en) * | 2011-12-19 | 2013-06-20 | Samsung Electronics Co., Ltd. | Method and apparatus for managing message |
US11477068B2 (en) * | 2012-09-27 | 2022-10-18 | Kaseya Limited | Data network notification bar user interface |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20090089381A1 (en) | Pending and exclusive electronic mail inbox | |
US8239874B2 (en) | Inbox with focused messages according to categories | |
US10757057B2 (en) | Managing conversations | |
US10250549B2 (en) | Electronic message organization via social groups | |
US8490185B2 (en) | Dynamic spam view settings | |
US7222157B1 (en) | Identification and filtration of digital communications | |
EP2973380B1 (en) | Email assistant for efficiently managing emails | |
US20070050456A1 (en) | Automated creation of e-mail distribution lists | |
US10536419B2 (en) | Searching and displaying related content to a post in an activity stream | |
US20100312836A1 (en) | Traversing between electronic mail and real time communications | |
EP2017778A1 (en) | Method and device for processing e-mail | |
CN101197790B (en) | Method and device for acquiring latest dynamic information of users in instant communication | |
KR20050121222A (en) | Identifying and using identities deemed to be known to a user | |
US10057203B2 (en) | Managing messages using batch edits and/or actions | |
TW200412507A (en) | Improved handling of messages in an electronic messaging system | |
US20090183096A1 (en) | Modeling conversations in electronic mail systems | |
US20120173995A1 (en) | Electronic gate filter | |
JP4688630B2 (en) | E-mail classification device and e-mail classification method | |
US11956197B2 (en) | Method for providing an email user experience by contacts instead of folders | |
JP4688629B2 (en) | Electronic message classification device and electronic message classification method | |
Otnes et al. | Communicating with E-mail, IM, and Social Networks | |
CN116233054A (en) | E-mail processing method and device, electronic equipment and storage medium | |
RU2595617C2 (en) | Method and system for creating list of electronic messages | |
Schwartz | Google Gmail: Visual QuickStart Guide | |
Miller | Gmail in 10 Minutes, Sams Teach Yourself |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MICROSOFT CORPORATION, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ANDERSON, CHRISTINE;SHAHINE, OMAR;KIKIN-GIL, EREZ;AND OTHERS;REEL/FRAME:019914/0837;SIGNING DATES FROM 20070924 TO 20070928 |
|
AS | Assignment |
Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034542/0001 Effective date: 20141014 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |